1,225 computer-security "https:" "https:" "https:" "https:" "https:" "https:" "https:" positions at Rutgers University
Sort by
Refine Your Search
-
Listed
-
Category
-
Program
-
Field
-
for Regulatory Science, the Center of Excellence for Rapid Surveillance of Tobacco, the Tobacco Dependence Program, a Tobacco Industry Marketing Program, and a Tobacco Control Law & Policy Resource
-
Presidential Employee Excellence Recognition program. Manages the Human Resources brand and reputation, including oversight of websites, newsletters, and social media. Partners with HR leaders, academic units
-
requires significant interaction with community disability service provider agencies, including direct support professionals and program directors, families, and specialists in a range of disciplines. In
-
Johnson Medical School Internal Medicine Residency Program and augment inpatient clinical care while engaging in the teaching and supervision of residents and students at Robert Wood Johnson University
-
and write/type proficiently is essential. Ability to implement universal precautions and safety precautions. Extended sitting is required to provide treatment and prepare clinical documentation. WORK
-
perform the job duties. Must be computer literate with proficiency and working knowledge of database and reporting tools such as Microsoft Word, Excel and PowerPoint. Applicant should be highly motivated
-
, on program implementation and outcomes, along with producing peer-reviewed publications and public reports. The Associate will also lead the coordination of statewide and local research and practice learning
-
the individual a medical or religious exemption. Additional infection control and safety policies may apply. Prospective employees should speak with their hiring manager to determine which policies apply
-
, experience, and/or training may be substituted for the degree requirement. Certifications/Licenses Required Knowledge, Skills, and Abilities Maintaining confidentiality is required. Must be computer literate
-
of virtualization, cloud computing, and endpoint management technologies. Knowledge of cybersecurity best practices, including identity management, data protection, and secure configuration standards. Equipment